StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber-Attack Countermeasures - Essay Example

Cite this document
Summary
The paper "Cyber-Attack Countermeasures" is a delightful example of an essay on information technology. The author argues in a well-organized manner that cybersecurity entails the maintaining and protection of computer systems and the information they contain from intrusion, disruption, or malicious damage…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Cyber-Attack Countermeasures
Read Text Preview

Extract of sample "Cyber-Attack Countermeasures"

The paper "Cyber-Attack Countermeasures" is a delightful example of an essay on information technology. Cybersecurity entails the maintaining and protection of computer systems and the information they contain from intrusion, disruption, or malicious damage. Since computer networks have become key elements in both business activities and the running of governments, tampering with them could have grave consequences for organizations, firms, and individuals (Kosat et al., 2010). The question to what degree these individual-level concerns translate into risk for critical infrastructure brought about the coining of the term “Digital Pearl Harbor” in the mid-1990s which referred to the predictions of a world where hackers would plunge capitals into blackness, poison water supplies, open floodgates, not to mention cause aircrafts to crash into each other. Although the idea could have been far-fetched, nothing is far from the truth and countermeasures need to be developed.

It is for a fact that cyber-attack have never produced results predicted by the “Digital Pearl Harbor” in spite of being thousands of them. Nonetheless, cyber-attacks remain a cause for concern, and there is a need to counter them. Being prepared is a measure by itself. The process of preparation is an ever-ongoing process. It necessitates sharpening the tools used to identify and handle security glitches (Giani et al., 2011). It covers not only the implementation but also the operation of the tools, collecting and sharing information, building recommendations for toughening systems and avoiding network vulnerabilities. At this point, it should be underscored that maintaining a close link with IT Risk management is imperative.
Secondly, if an incident happens, the most important thing the victim should do is detect it in a timely fashion. Having working and up-to-date sources of information such as vulnerability reports, and centralized log information originating from access management systems, firewalls, proxies, DNS servers, and so on is crucial. Identifying a threat is critical as it helps in its classification, allowing the victim to establish a procedure of dealing with it (Li et al., 2012).
Conclusively, most victims of cyber-attacks have gone through the process due to using obsolete computer technologies to protect themselves from dynamic cyber –attacks. The situation is worsened by a poor detection method. In other words, some victims do not even realize their network systems have vulnerabilities leading to dire consequences from their part. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Cyber-Attack Countermeasures Essay Example | Topics and Well Written Essays - 478 words, n.d.)
Cyber-Attack Countermeasures Essay Example | Topics and Well Written Essays - 478 words. https://studentshare.org/information-technology/1886100-cybersecurity-threats
(Cyber-Attack Countermeasures Essay Example | Topics and Well Written Essays - 478 Words)
Cyber-Attack Countermeasures Essay Example | Topics and Well Written Essays - 478 Words. https://studentshare.org/information-technology/1886100-cybersecurity-threats.
“Cyber-Attack Countermeasures Essay Example | Topics and Well Written Essays - 478 Words”. https://studentshare.org/information-technology/1886100-cybersecurity-threats.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber-Attack Countermeasures

Business Strategies for Bestcheese Restaurant & Cyber

… The paper "Business Strategies for Bestcheese Restaurant & Cyber " is a perfect example of a business case study.... This business plan report has been prepared by the board of directors of St.... Luke's Hospice, a charitable organization to seek funds from the bank to help them start a restaurant and a cyber café to meet some hospital expenses....
8 Pages (2000 words) Case Study

Information Security Management System

… The paper "Information Security Management System" is a great example of management coursework.... The information has and continues to play a vital role in the business environment.... Wang (2008 p.... 61) writes that information is a major organizational asset.... The Decision-making process relies solely on the amount and the accuracy of the information that an organization has gathered....
15 Pages (3750 words) Coursework

Manage Risk: Midlands Hotel

The strength of the framework is understanding and appreciating risks and some mitigation processes, but the lack of evaluation and provision of countermeasures in instances of accidents is lacking.... … The paper "Manage Risk: Midlands Hotel" is a perfect example of a business case study....
18 Pages (4500 words) Case Study

Maroochy Water Services Knowledge Management System

… Generally speaking, the paper "Maroochy Water Services Knowledge Management System" is a good example of a management case study.... nbsp;Maroochy Shire Council has been in existence for a long time but never before had anybody thought that the company had a weak insecure control system that could be attacked....
8 Pages (2000 words) Case Study

Business Information Systems

… The paper "Business Information Systems" is a perfect example of a business assignment.... Vulnerabilities of assets refer to the flaws in the assets of an organization; or in the words of Lenaghan and Onwubiko (2007), it is the absence of controls in security that could result in a breach in the security of the assets when they are exploited by threats....
6 Pages (1500 words) Assignment

The Resilience of Energy Supply Chains of the EU

Risk Management and Resilience The procedure of detecting threats, possible strategies, and the countermeasures to manage the emergent supply chain disruptions constitutes risk management and resilience.... … The paper "The Resilience of Energy Supply Chains of the EU" is a great example of a business case study....
6 Pages (1500 words) Case Study

The Role and Importance of Supply Chain Risk Management

… The paper "The Role and Importance of Supply Chain Risk Management" is a great eample of management coursework.... nbsp;There have been different definitions provided by many scholars in relation to Supply Chain Risk Management.... The Supply Chain Risk Management refers to the management of supply chain risk by coordinating and collaborating among the partner's supply chain in ensuring continuity as well as profitability....
9 Pages (2250 words) Coursework

Business Incidence at Anthem Blue Cross and Blue Shield

… The paper 'Business Incidence at Anthem Blue Cross and Blue Shield" is a good example of a management case study.... Business entities across the world are increasingly integrating technology into their operations to enhance efficiency levels.... Nonetheless, most of these businesses have failed to consider the challenges associated with technology including the data breach issues....
8 Pages (2000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us